¹È¸èGemini¼ä½ÓÌáÐÑ×¢Èë·ìÏ¶ÆØ¹â
°ä²¼¹¦·ò 2026-01-211. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢Èë·ìÏ¶ÆØ¹â
1ÔÂ19ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶һÏîÀûÓüä½ÓÌáÐÑ×¢Èë¼¼Êõ¹¥»÷¹È¸èGeminiµÄ·ì϶£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÔ죬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨ·¡£Miggo Security×êÑÐÖ÷¹ÜLiad EliyahuÖ¸³ö£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâÌìȻ˵»°ÌáÐÑ£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É½Ó¼û¸öÈË»áÒéÊý¾Ý²¢´´½¨ºýŪÐÔÊÂÎñ¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËÍÔ̺¬ÌØÔìÌáÐѵÄÈÕÀúÔ¼Çë¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬AI»á½âÎöÊÂÎñÃèÊöÖеĶñÒâÌáÐÑ£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ»áÒéÊý¾Ý£¬´´½¨ÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÌáÒª¡£ÔںܶàÆóÒµÅäÖÃÖУ¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬Ê¹ÆäÄÜÇÔÈ¡¸öÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£Õâ´ÎÅû¶ÕýÖµÆäËûAI°²È«·ì϶Ƶ·¢Ö®¼Ê¡£VaronisÃèÊöµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµ°²È«½ÚÔìÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢ÏÖȨÏÞÌáÉý·ì϶£¬ÔÊÐíµÍȨÏÞ¹¥»÷Õß½Ù³Ö¸ßȨÏÞ·þÎñ´úÀí£»The Librarian¹¤¾ß´æÔÚ¶à¸ö·ì϶£¨CVE-2026-0612µÈ£©£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£»ÏµÍ³ÌáÐÑÌáÈ¡·ì϶ͨ¹ýLLM¸±ÊÖÌáȡϵͳÌáÐÑ£»Claude CodeÊг¡´æÔÚ¶ñÒâ²å¼þ¹¥»÷£»Cursor´æÔÚRCE·ì϶£¨CVE-2026-22708£©£¬¿ÉÀûÓÃShellºÅÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£
https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html
2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾
1ÔÂ20ÈÕ£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¸Ã×é֯ͨ¹ý°ä²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÕþ»ã±¨¡¢É󼯏ú×ټͼ¡¢³É±¾¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬°µÊ¾Æä¶Ô¹ÜÕÊ»òÆóÒµ×ÊÔ´¹æ»®ÏµÍ³Õ¼Óнṹ»¯½Ó¼ûȨÏÞ¡£ÆäÖÓװͶ×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄÜÔ̺¬¶Ê»ἶ±ð»úÃÜ×ÊÁÏ£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔò¾ßÌå¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°Ã³Ò×ͬ°éµÄÐÕÃû¡¢µØÖ·¡¢µç»°¼°ÓÊÏä¡£´Ë±í£¬ÄÚ²¿ÃŵêÊý¾ÝÔ̺¬¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬µ«½ØÖÁĿǰ¸Ã¹«Ë¾ÉÐδ°ä²¼¹Ù·½ÉêÃ÷£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£
https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/
3. ACF Extended¸ßΣ·ì϶Òý´ó¹æÄ£¿úËÅ·çÏÕ
1ÔÂ20ÈÕ£¬½üÈÕ£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ´æÔÚÑϳÁ°²È«·ì϶CVE-2025-14533£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌÀûÓø÷ì϶»ñÈ¡ÖÎÀíȨÏÞ¡£¸Ã²å¼þĿǰÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓã¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©´ó²å¼þ£¬Îª¿ª·¢ÈËÔ±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌṩ¶î±íÖ°ÄÜ¡£·ì϶´æÔÚÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£ÎÊÌâ±¾ÔÔÚÓÚ±íµ¥Óû§´´½¨»ò¸üйý³ÌÖУ¬½ÇÉ«ÏÞ¶Èδ±»Ç¿ÔìÖ´ÐУ¬¼´±ã×Ö¶ÎÉèÖÃÖÐÕýÈ·ÅäÖÃÁ˽ÇÉ«ÏÞ¶È£¬¹¥»÷ÕßÈÔ¿ÉËÁÒâÉèÖÃÓû§½ÇÉ«£¬´Ó¶øÆëÈ«½ÚÔìÍøÕ¾¡£¸Ã·ì϶Óɰ²È«×êÑÐÔ±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢ÏÖ²¢»ã±¨£¬¹©¸øÉÌÔÚËÄÌìºó°ä²¼0.9.2.2°æ±¾½¨¸´¡£È»¶ø£¬Æ¾¾Ýwordpress.orgÏÂÔØÍ³¼Æ£¬×Ô½¨¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬Èç¹ûËùÓÐÏÂÔØ¾ùΪ×îа汾£¬ÈÔÓÐÒ»ÑùÊýÁ¿ÍøÕ¾Ãæ¶Ô¹¥»÷·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/
4. VoidLinkÔÆ¶ñÒâÈí¼þ²û·¢³öÏÔÖøµÄAIÌìÉúÌØµã
1ÔÂ20ÈÕ£¬½üÈÕ£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄ¾ßÌåÐÅÏ¢£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓɾ«Í¨¶à±à³Ì˵»°µÄÖйú¿ª·¢Õß½èÖúÈËΪÖÇÄÜÄ£ÐÍ¿ª·¢¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬VoidLinkÔ̺¬×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²È뷨ʽ¡¢rootkit¶ã±ÜÄ£¿é¼°ÊýÊ®¸öÖ°ÄÜÀ©´ó²å¼þ£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢°²È«½ç¸ß¶È¹Ø×¢¡£×êÑÐÖ¸³ö£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄܸ±ÊÖTRAE SOLO¡£ÓÉÓÚ·þÎñÆ÷´æÔÚÊ¢¿ªÄ¿Â¼·ì϶£¬¿ª·¢¹ý³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´Ì´òËã¼°ÄÚ²¿ÏîÄ¿½á¹¹±»Òâ±íй¶¡£Check Pointͨ¹ý¶ÈÎöÕâЩÎļþ·¢ÏÖ£¬¿ª·¢Õßѡȡ¹æ·¶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬Í¨¹ýAIÌìÉúº¸Ç¼Ü¹¹¡¢µü´úºÍ³ß¶ÈµÄ¶àÍŶӿª·¢´òËã¡£Ö»¹ÜÏîÄ¿¹æ»®ÖÜÆÚΪ16-30ÖÜ£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£
https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/
5. TP-Link½¨¸ßΣ·ì϶£º32¿îÆóÒµÉãÏñÍ·´æÉí·ÝÑéÖ¤·çÏÕ
1ÔÂ20ÈÕ£¬TP-Link½üÆÚ½¨¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣ·ì϶£¬¸Ã·ì϶ӰÏìÆäVIGI²úÆ·ÏßÖг¬¹ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·Ðͺš£·ì϶Ö÷ÌâÔÚÓÚ±¾µØWeb½çÃæµÄÃÜÂ븴ÔÖ°ÄÜ´æÔÚÉí·ÝÑéÖ¤ÈÆ¹ýȱµã£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶ͨ¹ý°Ñ³Ö¿Í»§¶Ë״̬£¬ÔÚδ¾±¾µØÍøÂçÉí·ÝÑéÖ¤µÄÇé¿öÏÂÖ±½Ó³ÁÖÃÖÎÀíÔ±ÃÜÂ룬´Ó¶ø»ñµÃÉ豸µÄÆëÈ«ÖÎÀíȨÏÞ¡£¾Ý°²È«²¼¸æÅû¶£¬¸Ã·ì϶ÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÔ죬ֱ½ÓÅú¸ÄÖÎÀíÔ¹ØË»§ÃÜÂë¡£Ò»µ©³É¹¦ÀûÓ㬹¥»÷Õß²»½öÄܽÚÔìÉãÏñÍ·ÅäÖᢽӼûʵʱ¼°º¹ÇàÊÓÆµÊý¾Ý£¬»¹¿É½«É豸ÄÉÈë½©Ê¬ÍøÂçÌáÒéDDoS¹¥»÷£¬»ò´Û¸Ä¼à¿ØÖ¤¾Ý¡¢ÇÖÈÅÆóÒµÔËÓª£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÔìóÒµÄÚÍø£¬Òý·¢¼äµý»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉú·çÏÕ£¬²¢¿ÉÄÜÒò¼Óº¦ÒþÖÔ´¥·¢Ë¾·¨Óë¼à¹Ü´¦·£¡£
https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html
6. "Nomad Leopard"´¹µö¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹µ±¾Ö¹ÍÔ±
1ÔÂ21ÈÕ£¬Ó¡¶ÈÍøÂ簲ȫ¹«Ë¾Seqrite½üÈÕÅû¶£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º¯¼þµÄÍøÂç´¹µöÓʼþ£¬¶Ô°¢¸»º¹µ±¾Ö¹ÍÔ±ÌáÒ龫׼¹¥»÷¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢ÏÖ£¬¹¥»÷Õß¾«ÐÄÉè¼Æµö¶üÎĵµ£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢Ô̺¬²ÆÕþÉ걨Åúʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«º¯"£¬ÓÕʹָ±ê´ò¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬ÊµÏÖÊý¾ÝÇÔÈ¡Óë±í´«¡£×êÑÐÈËÔ±·¢ÏÖ£¬¹¥»÷Õß½«GitHub×÷ÎªÒ»Ê±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬Í¨¹ý12ÔÂÏÂÑ®´´½¨µÄÕ˺ŷַ¢¶ñÒâÎļþ£¬Ðж¯ÊµÏÖºóѸ¿ìɾ³ýÄÚÈÝ¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´óÁ¿Ë¾·¨ÓëÐÐÕþÎļþ£¬Ô̺¬°¢¸»º¹µ±¾ÖÖ¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹°ü±ÓÈËȨÎļþ£¬ÕâЩ×ÊÁÏ»ò³ÉΪ½«À´¹¥»÷µÄ"µö¶ü¿â"¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"»¯Ãû£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬²¿ÃÅÕ˺ŹØÁª°Í»ù˹̹£¬ÇÒÓÃÓÚ³Á¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£Õâ´Î¹¥»÷±»¶¨ÃûΪ"Nomad Leopard"£¬SeqriteÖÒ¸æÆäÁìÓò¿ÉÄÜÀ©´óÖÁÆäËû¹ú¶È¡£
https://therecord.media/hackers-target-afghan-workers


¾©¹«Íø°²±¸11010802024551ºÅ